Cyber Security work shop by Kapil Mehrotra

IyogiIndia 122 views 24 slides Jun 11, 2021
Slide 1
Slide 1 of 24
Slide 1
1
Slide 2
2
Slide 3
3
Slide 4
4
Slide 5
5
Slide 6
6
Slide 7
7
Slide 8
8
Slide 9
9
Slide 10
10
Slide 11
11
Slide 12
12
Slide 13
13
Slide 14
14
Slide 15
15
Slide 16
16
Slide 17
17
Slide 18
18
Slide 19
19
Slide 20
20
Slide 21
21
Slide 22
22
Slide 23
23
Slide 24
24

About This Presentation

Cyber Security Work shop by Kapil Mehrotra 11/06/2021. For cybersecurity workshop contact me [email protected]


Slide Content

Cyber Security Awareness Session
Copyright By Kapil Mehrotra
Date : 1/06/2021

About Myself
•Name : Kapil Mehrotra
•Experience : 24Yrs (Time files ☺)
•Mostly worked in BFSI & Healthcare domain
•Having little learning curve & patience listener.
•Like to buy books a lot.. ☺slow reader but try to complete one book at least
in a month.
•Like too much adventures in the life. (From where people say “Hum se naho
payega” from there I start to search for “Hum se ho payega”) (+V)
•Love all kind of sports (Gyming, Golfing, Running, Marathon, Dance, Cricket
etc.)
•Die hard animal lover.
•Very active in few government communities for drafting Cloud and Cyber
security skill development policies since 2015.

Type of cyber threats
•“Phishing Attacks” to steal the User ID and Passwords and to gain
the access of the server, laptop or desktop.
•“Fake Link” Through this hacker gain the remote control of the
victim devices to steal OTP , PayTM, UPI, Credit Card, Contacts,
Images, Videos and documents. (anydesk, teamviewer, logmein,
Ammyy)
•Social media scams (Twitter, Facebook, Instagram)
•SQL injection, Virus, Malware and Ransomware
•Fake websites that steal data.
•DDOS & Network attacks
•Insider attacks

What are the consequences of a cyber attack?
Cyberattackscandisruptandcauseconsiderable
financialandreputationaldamagetoeventhemost
resilientorganization.Ifyousufferacyberattack,you
standtoloseData,reputationandbusiness,and
potentiallyfaceregulatoryfinesandlitigation–aswell
asthecostsofremediation.

Why do we need Cyber Security
•In 2020 we must secure 300 billion passwords globally.
•There are 111 billion lines of new software code being produced each year,
•The world’s digital content is expected to grow 96 zettabytes by 2020
•Dark Web is 5000 times larger than the surface web.
•20 million connected cars will ship with built-in software-based security
technology by 2020
•1 Cr 80L Daily Images getting uploaded on the internet
•50 billion devices connected to the Internet by 2020

Cybercrime Market FY 2020-2021
•Cybercrimecostedbusinessesover$4trilliontotalin
2020.
•Cybercrimewillcosttheworld$6trillionby2021.
•Theaveragecostofadatabreachin2020willexceed
between$4millionto$150million
•Approximately$6trillionisexpectedtobespent
globallyoncybersecurityby2021

Look at the Hackers Roadmap
•On average 30,000 new websites are getting hacked every day.
•Hackers create 300,000 new pieces of malware daily.
•There is a hacker attack every 39 seconds
•62% people are experiencing phishing attacks
•64% of companies have experienced web-based attacks
•Distributed denial-of-service (DDoS) attack grew to more than
1.44TB, increasing in size by 500%.
•41% ransomware attacks are rising year on year.
Attacks : 1,58,727 per hour, 2,645 per minute and 75 every second of
every day

Few Use Cases of
Cyber Security

Ashley Madison –Hack (Lawsuit $30 million)

Ashley Madison

37Million (9.8GB data) hacked and dumped on DW(PII)

Sony Hack

Sony Hack costed $15 Million
Reason:NorthKoreawarnsSonybeforethelaunchof
movebecauseitwasrelatedwith“KimJongUn”
Interviewandassassinationconspiracy&makingfunfor
theirpresident.
Sony has not taken it seriously.
Hackerhacked47,000currentandformersemployee
data,HRData,UserIds&Passwords,ClinicalInformation,
SSONo,Allemailsand100TBdataincluding(Moviesi.e
AaronandDave’s-“TheInterview”,BradPitt’s-“Fury”

Dominos
•Customers’personaldataincludecustomers’names,
emailids,mobilenumbers,andlocationsrelatedto18
croreordersthatareplacedwithDomino’sIndiaare
madeavailableonline.
•“Domino’sIndiaDataBreachincludes13TBemployee
filesandcustomerdetails,”showsthewebpagewitha
queryboxtofetchthedetailsbyHackers.
•https://slf2rrahypck3bwckpdohsnhpeqrb3nhvwznjmar
mweofwnptowe4mad.onion.ly/

Dominos

Dominos

Who was the first hacker?
Konrad Zuse

Do you know?
Kevin Mitnick is the biggest hacker in the world.
1.Mitnick Security Consulting
2.Security awareness training company “KnowBe4”
3.Board Of Director in “Zimperium”
4.Film : Track Down
5.An Author

IT Act & Data Privacy in India
1.InformationTechnologyAct,2000.(India)
2.ITAmendmentAct2000tostrengthenthecybersecurity
laws.(Section43,65to71).i.e.Hacking,failindata
protection,usingimage,videoorcontentwithout
permissionetc.)
3.EUGeneralDataProtectionRegulation(GDPR)
4.ThePersonalDataProtectionBill,2019(PI&PIIdata
shouldbeprocessedandstored)
Note:
UptothreeyearsImprisonmentor/andfineupto5L
AppointmentofDPO(DataProtectionOfficer

WhatsApp Issue
1.WhatsApptookanobjectiontoatraceabilityclauseinthenewIT
Rulesthatrequiressocialmediaplatformstolocate“thefirst
originatoroftheinformation”ifrequiredbythegovernment.
2.IndianRule4(2)makesitmandatoryforsocialmedia
intermediariestotracetheoriginatorofamessageorposton
theirplatformifrequiredbyacourtoracompetentauthority
underSection69AoftheITAct.

•Do not share your password
•Keep Changing your password frequently
•Do not click on the anonymous link from any laptop or mobile
•Don’t open any emails which comes from strangers. (It may be phishing email).
•Don’t download songs and movies
•Don’t use USB or any external devices from out sides.
•Don’t transfer data from mobile & In Mobile storage.
•“Be Aware”We monitor you through DLP and logs your daily activities.
•Apps should maintain user login and logout status as well.
Do’s & Don'ts

Is your email have been compromised ever
•https://haveibeenpwned.com/
•https://www.security.org/how-secure-is-my-password/
Practical

How to report a cyber crime in India?
https://cybercrime.gov.in/Default.aspx
ForWomenandChild:
[email protected]

Thank you
•EmailID:[email protected]
•MobileNo:9811779881